Lepide How-to Guides

A knowledgebase to help IT professionals solve a myriad of change auditing, security and operations problems

How to Find who Added a User to the Domain Admins Group

Read How-to arrow - icon

How to View Active Directory Audit Logs

Read How-to arrow - icon

How to Audit Account Logon Events in Active Directory

Read How-to arrow - icon

Find Source of Failed Logon Attempts in Active Directory

Read How-to arrow - icon

How to List All Computers in an Organizational Unit (OU)

Read How-to arrow - icon

How to Troubleshoot Active Directory Domain Controller (AD DC) could not be Contacted

Read How-to arrow - icon

Load More

PowerShell to Find a File and Check If File Exists

Read How-to arrow - icon

How to View or Check Netapp Logs

Read How-to arrow - icon

How to Check Who Last Modified a File in Windows?

Read How-to arrow - icon

How to Find Empty Folders using PowerShell

Read How-to arrow - icon

How To Create an Event Log Clear Report

Read How-to arrow - icon

How to Find Out Who Changed the File and Folder Permissions

Read How-to arrow - icon

Load More

How to Disable Control Panel using Group Policy

Read How-to arrow - icon

How to Use Group Policy to Map Network Drives on Windows

Read How-to arrow - icon

How to Change/Edit Group Policy Settings?

Read How-to arrow - icon

How to Audit Group Policy Changes Using Event Logs

Read How-to arrow - icon

How to Track Who Deleted a GPO in Active Directory

Read How-to arrow - icon

PowerShell to Backup and Restore Group Policy Objects

Read How-to arrow - icon

How to Check Who Deleted a File on SharePoint

Read How-to arrow - icon

How to Check SharePoint Permissions for a User and Group

Read How-to arrow - icon

How to Audit SharePoint Permissions Changes

Read How-to arrow - icon

How to Audit SharePoint Changes by viewing Audit Logs

Read How-to arrow - icon

How To Check SharePoint Site Usage

Read How-to arrow - icon

How to Compare Permissions in Exchange Server

Read How-to arrow - icon

How to Track Who Accessed Mailboxes in Exchange Server 2016

Read How-to arrow - icon

How to Monitor the Health of Exchange Server

Read How-to arrow - icon

How to Track Permission Changes on Exchange Server Mailboxes

Read How-to arrow - icon

How to Monitor Non-Owner Mailbox Accesses on Exchange Server 2013

Read How-to arrow - icon

How to Track Exchange Server Shared Mailboxes Access using EAC

Read How-to arrow - icon

Load More

How to Detect Illicit Applications in Microsoft Entra ID

Read How-to arrow - icon

How To Check if MFA is Enabled in Microsoft 365

Read How-to arrow - icon

List Shared Mailboxes Members & Permissions with PowerShell

Read How-to arrow - icon

What is Error Code: 53003 and How to Fix it?

Read How-to arrow - icon

How to Get an External Sharing Report in SharePoint Online

Read How-to arrow - icon

How to Set up Alerts in SharePoint Online

Read How-to arrow - icon

Load More

How to Monitor New File Creation in Folders with PowerShell

Read How-to arrow - icon

List Scheduled Tasks on Windows Machines with PowerShell

Read How-to arrow - icon

Guide to Use Get-ADComputer Cmdlet in PowerShell

Read How-to arrow - icon

How to Automate PowerShell Scripts with Task Scheduler

Read How-to arrow - icon

Find Weak Passwords in Active Directory with PowerShell

Read How-to arrow - icon

Get-Mguser PowerShell to Get & Export Azure AD Users to CSV

Read How-to arrow - icon

Load More

How to View SQL Server Database File Locations

Read How-to arrow - icon

How to List User Roles in SQL Server

Read How-to arrow - icon

How to Enable SQL Server Auditing and View Audit Logs

Read How-to arrow - icon